Analysis
-
max time kernel
9s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
Resource
win10v2004-20240802-en
General
-
Target
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe
-
Size
7.0MB
-
MD5
ee62f6b133d214cfcb519f70cd86774c
-
SHA1
201e826ef70a432c9f7872173870b192a7af068b
-
SHA256
06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86
-
SHA512
a914099fb84f42d4517a6c2c1aa84b0d324cb9eee5d2a578784b1c232d2db18f54098508b6d321c34404936f57cc6bb58212c4329291a904e2a8744ccbb41fd9
-
SSDEEP
98304:emhd1UryeAnQVi19EUGuKKHV7wQqZUha5jtSyZIUbn:elgnT1aUG2H2QbaZtliK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 97EC.tmp -
Executes dropped EXE 1 IoCs
pid Process 3032 97EC.tmp -
Loads dropped DLL 2 IoCs
pid Process 2876 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 2876 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3032 2876 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 30 PID 2876 wrote to memory of 3032 2876 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 30 PID 2876 wrote to memory of 3032 2876 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 30 PID 2876 wrote to memory of 3032 2876 06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe"C:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\97EC.tmp"C:\Users\Admin\AppData\Local\Temp\97EC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\06eeaf202ca6b3427aa72d4d60458b06fbf1a156ded17a30a9856b2d2baa6b86.exe 222C75515E5B30F87E1C1974BE7203B7D9C0958E10D6C24963D1A5C3F7E5320E801C082577270A636CD0710F52FBE1B25B3177753ECDFAEED246FD965B9DB1382⤵
- Deletes itself
- Executes dropped EXE
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD558e70e55a324d8e1b4d53420467f93ed
SHA1a591673eb6d0ead215c5324bc40514acbb177a00
SHA2562f71bca75287f61779660e42e5b0862d0b619a6fedb40e1bf383c4e8f6dbfb27
SHA512b8fd19086365f924b40def77ecfb007e960abedcbbbea6d7ba8b98bb5f0c75d981785f6a9faaa5bba92bb87d5636ac36172e513678d4ad8db4858492a405f173